Feeds

Porno blog spam turns nasty

Smut attack via compromised military proxies

  • alert
  • submit to reddit

High performance access to file storage

Blog spamming is turning nasty. First spotted approximately a year ago, blog spam involves the automated posting of Web address onto weblogs or online discussion boards.

Spam comments deposited using the technique include a link to a spamvertised website. The idea is not so much to get visitors to a spammed location to visit the promoted site but to increase its page rankings in Google. This, in turn, increases the prominence of the site in certain searches and therefore increases the likelihood that more visitors will visit a site. That's the theory anyway.

This nasty side-effect of the chronic interlinking of blogspace as interpreted by Google's PageRank algorithm has thus far been used to promote the usual Viagra sites, mortgage and Internet gaming sites. Blog writers have fought back by using anti-spam plug-ins blogging software. This has helped but it hasn't got rid of the problem.

Over recent months, regular email spammers have used networks of compromised machines to disseminate spam. Now we're starting to see the first evidence of blog spam been sent through compromised machines in order to promote illegal porn sites.

Last week spam advertising of "incest, rape and animal sex" pornography was posted on a web log which was set up to discuss the Draft ID Cards Bill. Mark, a prominent member of London 2600, and the person who runs the Watching Them, Watching Us site, was able to see that the offending post came from an open proxy on an unclassified military network. A number of other attacks apparently from the same address had also been tried. Mark was able to further trace the IP address of the apparent source of these spam attacks back to US hosting firm 3fn.net.

"I have other log file entries which show the pattern of illegal porn blog spam attacks from the same IP address, some through other open proxy servers," Mark writes. "At a guess the US military Internet gateways are members of a proxy chain, and it is some internal machine or machines which have either been compromised, or which are internet accessible and acting as open proxy servers via the gateways. Neither of these scenarios should be tolerated."

"No doubt 3fn.net will wish to cooperate with any investigation by the UK National High Tech Crime Unit to determine if its Apache web server [name supplied] has been compromised, or if it is only a link in a chain of compromised systems, or if customers or staff of 3fn.net are responsible."

Mark forwarded an email complaining about the problem to the US Military, 3fn.net and UK's National High Tech Crime Unit last week. The NHTCU has read his email and he's had a response for one of the techies at 3fn.net, who said he was looking into the problem. Mark has received nothing back from the US military.

3fn.net is yet to respond to our request for comment on the progress of this investigation. ®

Related stories

Google bug blocks thousands of sites
Google to fix blog noise problem
Google explains new page rankings
Phatbot arrest throws open trade in zombie PCs
The illicit trade in compromised PCs

Related links

Blog Aggregator software is prone to the same kinds of cross site scripting attacks as sometimes affect web browser software. A useful RSS feed to check on a dozen or so security holes in Blog Aggregator software is here. A popular anti-spam add-on to Movable Type blogging software is MT-Blacklist

.

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.